Service account is not authenticating to vCenter when OKTA is configured
search cancel

Service account is not authenticating to vCenter when OKTA is configured

book

Article ID: 392063

calendar_today

Updated On:

Products

VMware vCenter Server 8.0 VMware vCenter Server 7.0

Issue/Introduction

When using OKTA, it is common to have multi-factor authentication enabled to authenticate user accounts. While this works for user accounts, MFA cannot be used for service accounts, as it would require a user prompt/interaction. Further, service accounts are used to authenticate and use vSphere at a pace much greater than a user account.

Because of this, service accounts may fail to authenticate to a vCenter Server that has OKTA configured as identity provider source and MFA enabled.

Environment

vCenter Server 7.x

vCenter Server 8.x

OKTA is configured as identity provider for the vCenter Server

Resolution

Because the service accounts can't effectively use MFA, they must either be configured to bypass MFA, or the application(s) using the service accounts must be written to manually send an authentication API call to vSphere.

 

Option A) Within OKTA configuration, configure MFA to be bypassed for the service account(s). Please refer to "Bypass MFA for a Specific Set of Users" for detailed instructions.

 

Option B) Configure the application using the service accounts to send vCenter Server an New-OAuthSecurityContext API call for authentication (see developer information about the API call, here).